Change logs for openssl source package in Zesty

  • openssl (1.0.2g-1ubuntu11.4) zesty-security; urgency=medium
    
      * SECURITY UPDATE: Read/write after SSL object in error state
        - debian/patches/CVE-2017-3737-pre.patch: add test/ssltestlib.*,
          add to test/Makefile.
        - debian/patches/CVE-2017-3737-1.patch: don't allow read/write after
          fatal error in ssl/ssl.h.
        - debian/patches/CVE-2017-3737-2.patch: add test to ssl/Makefile,
          ssl/fatalerrtest.c, test/Makefile.
        - CVE-2017-3737
      * SECURITY UPDATE: rsaz_1024_mul_avx2 overflow bug on x86_64
        - debian/patches/CVE-2017-3738.patch: fix digit correction bug in
          crypto/bn/asm/rsaz-avx2.pl.
        - CVE-2017-3738
    
     -- Marc Deslauriers <email address hidden>  Thu, 07 Dec 2017 13:16:57 -0500
  • openssl (1.0.2g-1ubuntu11.3) zesty-security; urgency=medium
    
      * SECURITY UPDATE: Malformed X.509 IPAddressFamily could cause OOB read
        - debian/patches/CVE-2017-3735.patch: avoid out-of-bounds read in
          crypto/x509v3/v3_addr.c.
        - CVE-2017-3735
      * SECURITY UPDATE: bn_sqrx8x_internal carry bug on x86_64
        - debian/patches/CVE-2017-3736.patch: fix carry bug in
          bn_sqrx8x_internal in crypto/bn/asm/x86_64-mont5.pl.
        - CVE-2017-3736
    
     -- Marc Deslauriers <email address hidden>  Thu, 02 Nov 2017 11:28:12 -0400
  • openssl (1.0.2g-1ubuntu11.2) zesty; urgency=medium
    
      * aes/asm/aesni-sha*-x86_64.pl: fix IV handling in SHAEXT paths.
        (LP: #1674399)
    
     -- William Grant <email address hidden>  Fri, 19 May 2017 18:29:44 +1000
  • openssl (1.0.2g-1ubuntu11.1) zesty; urgency=medium
    
      * crypto/x86*cpuid.pl: move extended feature detection. (LP: #1674399)
        This fix moves extended feature detection past basic feature
        detection where it belongs. 32-bit counterpart is harmonized too.
    
     -- Eric Desrochers <email address hidden>  Thu, 27 Apr 2017 20:36:21 -0400
  • openssl (1.0.2g-1ubuntu11) zesty; urgency=medium
    
      * SECURITY UPDATE: Montgomery multiplication may produce incorrect
        results
        - debian/patches/CVE-2016-7055.patch: fix logic in
          crypto/bn/asm/x86_64-mont.pl.
        - CVE-2016-7055
      * SECURITY UPDATE: DoS via warning alerts
        - debian/patches/CVE-2016-8610.patch: don't allow too many consecutive
          warning alerts in ssl/d1_pkt.c, ssl/s3_pkt.c, ssl/ssl.h,
          ssl/ssl_locl.h.
        - debian/patches/CVE-2016-8610-2.patch: fail if an unrecognised record
          type is received in ssl/s3_pkt.c.
        - CVE-2016-8610
      * SECURITY UPDATE: Truncated packet could crash via OOB read
        - debian/patches/CVE-2017-3731.patch: harden RC4_MD5 cipher in
          crypto/evp/e_rc4_hmac_md5.c.
        - CVE-2017-3731
      * SECURITY UPDATE: BN_mod_exp may produce incorrect results on x86_64
        - debian/patches/CVE-2017-3732.patch: fix carry bug in
          bn_sqr8x_internal in crypto/bn/asm/x86_64-mont5.pl.
        - CVE-2017-3732
    
     -- Marc Deslauriers <email address hidden>  Mon, 30 Jan 2017 09:00:43 -0500
  • openssl (1.0.2g-1ubuntu10) zesty; urgency=medium
    
      * Provide libssl1.0-dev metapackage to satisfy dep-waits.
    
     -- Dimitri John Ledkov <email address hidden>  Thu, 10 Nov 2016 17:26:33 +0000
  • openssl (1.0.2g-1ubuntu9) yakkety; urgency=medium
    
      * SECURITY UPDATE: Pointer arithmetic undefined behaviour
        - debian/patches/CVE-2016-2177.patch: avoid undefined pointer
          arithmetic in ssl/s3_srvr.c, ssl/ssl_sess.c, ssl/t1_lib.c.
        - CVE-2016-2177
      * SECURITY UPDATE: Constant time flag not preserved in DSA signing
        - debian/patches/CVE-2016-2178-*.patch: preserve BN_FLG_CONSTTIME in
          crypto/dsa/dsa_ossl.c.
        - CVE-2016-2178
      * SECURITY UPDATE: DTLS buffered message DoS
        - debian/patches/CVE-2016-2179.patch: fix queue handling in
          ssl/d1_both.c, ssl/d1_clnt.c, ssl/d1_lib.c, ssl/d1_srvr.c,
          ssl/ssl_locl.h.
        - CVE-2016-2179
      * SECURITY UPDATE: OOB read in TS_OBJ_print_bio()
        - debian/patches/CVE-2016-2180.patch: fix text handling in
          crypto/ts/ts_lib.c.
        - CVE-2016-2180
      * SECURITY UPDATE: DTLS replay protection DoS
        - debian/patches/CVE-2016-2181-1.patch: properly handle unprocessed
          records in ssl/d1_pkt.c.
        - debian/patches/CVE-2016-2181-2.patch: protect against replay attacks
          in ssl/d1_pkt.c, ssl/ssl.h, ssl/ssl_err.c.
        - debian/patches/CVE-2016-2181-3.patch: update error code in ssl/ssl.h.
        - CVE-2016-2181
      * SECURITY UPDATE: OOB write in BN_bn2dec()
        - debian/patches/CVE-2016-2182.patch: don't overflow buffer in
          crypto/bn/bn_print.c.
        - debian/patches/CVE-2016-2182-2.patch: fix off-by-one in overflow
          check in crypto/bn/bn_print.c.
        - CVE-2016-2182
      * SECURITY UPDATE: SWEET32 Mitigation
        - debian/patches/CVE-2016-2183.patch: move DES ciphersuites from HIGH
          to MEDIUM in ssl/s3_lib.c.
        - CVE-2016-2183
      * SECURITY UPDATE: Malformed SHA512 ticket DoS
        - debian/patches/CVE-2016-6302.patch: sanity check ticket length in
          ssl/t1_lib.c.
        - CVE-2016-6302
      * SECURITY UPDATE: OOB write in MDC2_Update()
        - debian/patches/CVE-2016-6303.patch: avoid overflow in
          crypto/mdc2/mdc2dgst.c.
        - CVE-2016-6303
      * SECURITY UPDATE: OCSP Status Request extension unbounded memory growth
        - debian/patches/CVE-2016-6304.patch: remove OCSP_RESPIDs from previous
          handshake in ssl/t1_lib.c.
        - CVE-2016-6304
      * SECURITY UPDATE: Certificate message OOB reads
        - debian/patches/CVE-2016-6306-1.patch: check lengths in ssl/s3_clnt.c,
          ssl/s3_srvr.c.
        - debian/patches/CVE-2016-6306-2.patch: make message buffer slightly
          larger in ssl/d1_both.c, ssl/s3_both.c.
        - CVE-2016-6306
    
     -- Marc Deslauriers <email address hidden>  Fri, 23 Sep 2016 11:00:22 -0400